Jump to content

TrueCrypt Hacked


Tahnka
 Share

Recommended Posts

http://stoned-bootkit.blogspot.com/2009/07...ck-working.html

"From the technical point I am not hooking, patching or modifying TrueCrypt. But I am using double-forwards to intercept the encrypted and decrypted interrupt 13h disk I/O commands. It is like:

Windows request -> modified by Stoned Bootkit -> TrueCrypt Encryption -> (double forward here) -> Interrupt 13h"

http://peterkleissner.com/?p=11

"I suggested them solutions, offered them my help, however they are ignoring the security issue, so I will make my TrueCrypt attack open source. The software I have developed is able to bypass the full volume encryption of TrueCrypt when booting the computer. And they could easily prevent the attack from a running Windows – but they do not."

http://www.h-online.com/security/Bootkit-b...n--/news/113884

"At the Black Hat security conference, Austrian IT security specialist Peter Kleissner presented a bootkit called Stoned which is capable of bypassing the TrueCrypt partition and system encryption."

Link to comment
Share on other sites

He's just a loudmouth trying to get attention and he's getting it .

He needs the attention because he is starting his own start-up or whatever crap it was he wrote somewhere .

TrueCrypt is NOT cracked, all he does is intercept the password via a root-kit that

may or may not be able to "install itself" (if the user is stupid enough to let it) .

This is not very different from someone building a keylogger into your system .

Nothing new here really, if your system is compromised it's game over.

Link to comment
Share on other sites

I am not adding to his ego.. I have been in contact with Peter about his "hack" i am about to test this..

here is what he emailed me.. you dont even need someone to install something.. again just need physical access..

"Yes. The easiest way would be to use a Windows PE 2.0 and boot from CD (e.g.

BartPE) and execute the infector file from an usb stick.

I can provide you also instructions how you can manually install the Master

Boot Record with Linux, however that would require some more steps to do

manually."

I am testing this right now (full disk encryption takes awhile. at 77% right now)

Link to comment
Share on other sites

well that failed horribly..

ok i got it done and tried to use PE2.0 and it states "unable to build stoned directories on drive C:\"

i then booted into the system and loaded then it ran the infecter and it said "can't write backup MBR to on unpartitioned space"

i then deleted my D:\ and reran the infecter. it then stated same error. "unable to build stoned directories on drive C:\"

i then browsed to the "c:\stoned" which did exist I deleted these files and reran the infector. Said everything went well.. I rebooted and it did not load anything.. says i need to use my recovery disk to rebuild the MBR

Link to comment
Share on other sites

This is the way of security people. If something is too cost-prohibitive or functionally impossible to break into, the "bad guys" won't just give up. They'll come at it from a different angle and find a different way in. In this case, TrueCrypt is too good to just break into, and no one has legitimately broken it yet. So someone comes along and finds an easier way in. This doesn't necessarily mean that TrueCrypt is vulnerable, it just means that the end user needs to be aware that this might happen. My suggestion is to use a key file as well as a passphrase to protect your porn... I mean "important documents"

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...